Pavithra.A, Nithya.V

Pavithra.A, Nithya.V "Honeypot" Published in International Journal of Trend in Research and Development (IJTRD), ISSN: 2394-9333, Special Issue | NCPCIT-18 , September 2018, URL: http://www.ijtrd.com/papers/IJTRD18005.pdf

Internet is growing fast and doubling its number of websites every 53 days and the number of people using the internet is also growing. Hence, global communication is getting more important every day. At the same time, computer crimes are also increasing. Counter measures are developed to detect or prevent attacks, Most of these measures are based on known facts, known attack and network intrusion detection and reaction mechanism. As in the military, it is important to know, who the enemy is, what kind of strategy he uses, what tools he utilizes and what he is aiming for, gathering this kind of information is not easy but important .by knowing attack strategies, counter measure scan be improved and vulnerabilities can be fixed .to gather as much information as possible is one main goal of a honey pot generally such information gathering should be done silently, without alarming an attacker. All the gathered information leads to an advantage on the defending side and can therefore be used on productive systems to prevent attacks. A Honeypot is primarily an instrument for information gathering and learning its primary purpose is not to be an ambush for the black hat community to catch them in action and to press charges against Honeypot are hard to maintain and they need operators with good knowledge about operating systems and network security. In the right hands, a honeypot can be an effective tool for information gathering. In the wrong, unexperienced hands, a honeypot can become another infiltrated machine and an instrument for the black hat community, them. the fous lies on a silent collection of as much information as possible about their attack patterns, used programs, purpose of attack and the black hat community itself all this information is used to learnmore about the black hat proceedings and, as motives well as their technical knowledge and abilities, this is just a primary purpose of a honeypot. there are a lot of other possibilities for a honeypot, divert hackers while conducting an attack are just two possible examples. They are not the perfect solution for solving or preventing computer crimes. This paper will present the basic concept behind honeypots and also the legal aspects of honeypots.

Honeycomb, Blackhats, Hybrid Honeypot, VMARE, ID

Special Issue | NCPCIT-18 , September 2018


pompy wtryskowe|cheap huarache shoes| cheap jordans|cheap jordans|cheap air max| cheap sneaker cheap nfl jerseys|cheap air jordanscheap jordan shoes
cheap wholesale jordans